ONLINE VOTING SYSTEM POWERED BY AADHAR AUTHENTICATION

Similar documents
Online Voting System Using Aadhar Card and Biometric

Aadhaar Based Voting System Using Android Application

Smart Voting System using UIDAI

Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)

AADHAAR BASED VOTING SYSTEM USING FINGERPRINT SCANNER

SMS based Voting System

M-Vote (Online Voting System)

M-Polling with QR-Code Scanning and Verification

SECURE REMOTE VOTER REGISTRATION

Estonian National Electoral Committee. E-Voting System. General Overview

SMART VOTING. Bhuvanapriya.R#1, Rozil banu.s#2, Sivapriya.P#3 Kalaiselvi.V.K.G# /17/$31.00 c 2017 IEEE ABSTRACT:

IMPLEMENTATION OF SECURE PLATFORM FOR E- VOTING SYSTEM

Case Study. MegaMatcher Accelerator

Electronic Online Voting via Smart Phone App

E- Voting System [2016]

Novel E-Voting System with Biometric Authentication and Distributed Server System

CHAPTER 2 LITERATURE REVIEW

The problems with a paper based voting

Implementation of aadhar based voting machine using

ONLINE VOTING PORTAL BASED ON AADHAAR CARD VERIFICATION

Research Article. ISSN (Print)

Biometric voting Machine using UID(Aadhar)

Key Considerations for Oversight Actors

Key Considerations for Implementing Bodies and Oversight Actors

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

Introduction of Electronic Voting In Namibia

Response to the Scottish Government s Consultation on Electoral Reform

Trusted Logic Voting Systems with OASIS EML 4.0 (Election Markup Language)

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT

L9. Electronic Voting

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

The Use of New Technologies in Electoral Process in Bosnia and Herzegovina: Where we started and where we are going

Voting Corruption, or is it? A White Paper by:

Secure Voter Registration and Eligibility Checking for Nigerian Elections

Volume I Appendix A. Table of Contents

Additional Case study UK electoral system

Electronic Voting: Challenges and Prospects in Nigeria s Democracy

Statement on Security & Auditability

DESIGN AND ANALYSIS OF SECURED ELECTRONIC VOTING PROTOCOL

Ballot Reconciliation Procedure Guide

BIOMETRICS - WHY NOW?

E-Voting, a technical perspective

The Angola National ID Card

Secured Electronic Voting Protocol Using Biometric Authentication

Xournals. Indian Electoral System & EVM. Udit Singh 1. Abstract: Authors:

Jurnal Teknologi A BIOMETRIC E-VOTING FRAMEWORK FOR NIGERIA. Full Paper. Akintoye Kayode A. a,b*, Araoye, Olalekan I. b

EFFICACIOUS ELECTRONIC VOTING USING BIOMETRY

Should We Vote Online? Martyn Thomas CBE FREng Livery Company Professor of Information Technology Gresham College

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

GAO ELECTIONS. States, Territories, and the District Are Taking a Range of Important Steps to Manage Their Varied Voting System Environments

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

SMART VOTING SYSTEM USING ANDROID

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Swiss E-Voting Workshop 2010

International Journal of Research and Review E-ISSN: ; P-ISSN:

Towards One Person, One Vote via Real-Time Voter s Registration and Identification

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis

Position Paper IDENT Implementation for U.S. VISIT

VISION IAS

The usage of electronic voting is spreading because of the potential benefits of anonymity,

Privacy of E-Voting (Internet Voting) Erman Ayday

FULL-FACE TOUCH-SCREEN VOTING SYSTEM VOTE-TRAKKER EVC308-SPR-FF

WHY, WHEN AND HOW SHOULD THE PAPER RECORD MANDATED BY THE HELP AMERICA VOTE ACT OF 2002 BE USED?

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

VOTERGA SAFE COMMISSION RECOMMENDATIONS

SUMMARY INTRODUCTION. xiii

Assess the awareness level of people on Aadhaar Card as public wellbeing

Guide to Electronic Voting Election Runner

Secure Electronic Voting

Addressing the Challenges of e-voting Through Crypto Design

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

An Application of time stamped proxy blind signature in e-voting

Colorado Secretary of State Election Rules [8 CCR ]

Election Campaigner Through Android Application

International Biometrics & Identification Association

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

Enhanced Automated Biometric Web-Based Electronic Voting System for Nigeria

A Prescriptive Policy Paper on E-Governance Use of Wireless Technology in Electronic Voting Machine

Biometrics: primed for business use

Colorado Secretary of State Election Rules [8 CCR ]

Every electronic device used in elections operates and interacts

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes

Office for Democratic Institutions and Human Rights OSCE/ODIHR DISCUSSION PAPER IN PREPARATION OF GUIDELINES FOR THE OBSERVATION OF ELECTRONIC VOTING

Automation Of Election Process For District Election Officer (RO) By Election MIS Software

TO: Chair and Members REPORT NO. CS Committee of the Whole Operations & Administration

CPSC 467b: Cryptography and Computer Security

Biometrics and Identification in Development

MINISTRY OF INTERIOR AND COORDINATION OF NATIONAL GOVERNMENT Department of Immigration Services. East African Community e-passport: Kenyan Journey

Designing issues and requirement to develop online e- voting system systems having a voter verifiable audit trail.

ANTI FRAUD MEASURES. Principles

Biometrics Technology for Human Recognition

Procedures for the Use of Optical Scan Vote Tabulators

Internet Voting Process for The City of Greater Sudbury 2018 Municipal Election

Act means the Municipal Elections Act, 1996, c. 32 as amended;

Utilization of Information Technology for Electoral Management. Mr.Cholaraj Phewban Inspector General, Office of The Election Commission of Thailand

Introduction-cont Pattern classification

Transcription:

ONLINE VOTING SYSTEM POWERED BY AADHAR AUTHENTICATION M.Abinaya 1, K.Gowthami 2, M.Abinaya 3 1 Student, Department of Computer science, Panimalar Engineering College, Tamil Nadu, India 2 Student, Department of Computer science, Panimalar Engineering College, Tamil Nadu, India 3 Student, Department of Computer science, Panimalar Engineering College, Tamil Nadu, India ABSTRACT To provide a legal system that enables individuals to vote electronically. This system encompasses legal and social science aspects of the present legal system, while adding extra convenience and security to the general selection method. Bio metrics is the study of machine-driven methodology physical traits includes fingerprint identification that is that the method of scrutiny questioned and famous friction skin ridge impressions from fingers to work out if the impression square measure from identical finger. Casting vote may be a right given to each person by the constitution and whether or not the person truly solid votes in step with the law is that the major issue that has been discovered. The vote solid by a elector is reached to a candidate or party safely is additionally the particular right to be famous by the elector. This paper shows a planned model employing a fingerprint as a security that is take into account because the high security positive identification for soliding the vote and also the aadhar ID to login and cast the vote. This model truly provides importance to people that truly need to solid their vote, however cannot come back to their native places to merely solid vote. Instead individuals will sit within the most popular location and solid their vote firmly. This makes solid their precious vote simply and firmly to the party they really need to. Keywords: Biometric fingerprint, ASP.NET, SQL, Aadhar card, c#, visual studio 1. INTRODUCTION Voting schemes have evolved from enumeration hands in period of time to systems that embody paper, punch card, mechanical lever and optical-scan machines. An electronic electoral system that is employed these days offer some characteristic totally different from the normal selection technique, and conjointly it provides improved options of electoral system over ancient electoral system like accuracy, convenience, flexibility, privacy, verifiability and quality. However Electronic selection systems suffers from numerous drawbacks like time intense, consumes massive volume of paper work, no direct role for the higher officers, harm of machines as a result of lack of attention, mass update doesn t permits users to update and edit several item at the same time etc. These drawbacks will overcome by Biometric on-line electoral system. This is an electoral system by that any elector can use his/her selection rights from anyplace within the country. We offer an in depth description of the purposeful and performance characteristics of biometric on-line electoral system. Elector will solid their votes from 4252 www.ijariie.com 2137

anyplace within the country in extremely secured means. That produces selection a fearless of violence which increase share of selection. 2. RELATED WORK Yanez, M. O., & Gbolagade, K. A. [1] in 2013 proposed the Overview of Biometric Electronic Voting System in Ghana. International Journal of Advanced Research in Computer Science and Software Engineering. This paper presents the overview of the development and implementation of Biometric Electronic Voting System Software (BEVSS) in Ghana. Many African countries have proposed electronic voting system for their national elections, this paper as a case study for Ghana would be a pivotal reference to speeding up their implementation. Microsoft Visual Basic 2010 is used to develop the BEVSS at the front end and SQL Server Database at the backend. The BEVSS is integrated with a biometric fingerprint machine to scan the finger print of eligible voters during the registration process and for the authentication or verification on Election Day. The BEVSS would be implemented on personal computers over a Local Area Network at each polling station. Prasad, H. K., Halderman, A. J.,Gonggrijp.R[2] in 2010 Estonia was the first country in the world to use Internet voting nationally, and today more than 30% of it s ballots are cast online. In this paper, we analyze the security of the Estonian I-voting system based on a combination of in-person election observation, code review, and adversarial testing. Adopting a threat model that considers the advanced threats faced by a national election system including dishonest insiders and state-sponsored attacks we find that the I-voting system has serious architectural limitations and procedural gaps that potentially jeopardize the integrity of elections. In experimental attacks on a reproduction of the system, we demonstrate how such attackers could target the election servers or voters clients to alter election results or undermine the legitimacy of the system. Our findings illustrate the practical obstacles to Internet voting in the modern world, and they carry lessons for Estonia, for other countries considering adopting such systems, and for the security research community. Frances Zelazny [3] in 2009 proposed the Evolution of India s UID Program that based on the aadhar number India has embarked on an ambitious new program to provide its citizens and residents a unique, official identity. The UID (Universal ID) program aims to improve the delivery of government services, reduce fraud and corruption, facilitate robust voting processes, and improve security. It is by far the largest application of biometric identification technology to date and will have far-reaching implications for other developing countries that are looking to adopt national ID programs to further social and economic development. This paper discusses the evolution of the UID program, the innovative organization and path breaking technology behind it, how it is being rolled out, and how robust ID is beginning to be used. The paper also draws lessons for other countries. Unlike many legacy national ID programs, the UID is designed from the ground up to support authentication. Its use of multimodal biometrics increases inclusion into the main enrollment database and has a huge impacting improving accuracy. It relies on mobile technology, but has also become a driving force behind the development of that technology. Its standardsbased approach opens the way for vendor competition and cost reduction. At the same time, its exclusive focus on authentication still leaves the problem of how to validate certain aspects of identity, such as citizenship status. The paper discusses this in the context of the turf war between the UID and the National Population Registry. ID also shows the importance of learning from failure. The case of Andhra Pradesh, discussed in the Annex, showed both the potential value of biometric ID and weaknesses that led to that massive exercise failing to deliver on its potential. RathnaPrabha.S1, Trini Xavier.X2, Deepika.V3, Iswarya.C4 [4] in 2008 this paper proposed the concept There is lot of methods to avoid fraudulence in voting systems, but we are not able to eradicate it completely. This project will give solutions for the above mentioned problem. Fingerprint is one of the unique identities of a human being which is being used in the aadhar system. By using arguing software and by using image processing. We capture the finger print of every individual and the face of the individual is being captured. Face of the person captured is compared to aadhar details using lab view. In future, it could also be implemented using eye trace which will give more accurate results. Himanshu Agarwal, G.N.Pandey, [5] in 2013 proposed the online voting system For India election,the proposed model has a greater security in sense that voter high security needed before vote is accepted n database of Election commission of India(EC) in additional voter can confirm his/her vote gone to correct party. K. P. Kaliyamurthie1, R. Udayakumar, D. Parameswari and S. N. Mugunthan [6] n 2013 the am of this paper allow people to vote who have citizenship of India and whose age s above 18 years and of any sex can gave their vote through onlne.the proposed software s developed and worked based on Ethernet and to avoid false vote. Pranay R.pashne, Dhraj[7] n 2014 this paper present system of casting votes has resulted in a number of problems such as low percentage of voting etc.. Voting through EVM (electronic voting machine).to overcome these to introduce 4252 www.ijariie.com 2138

android application specifically designed for electronic voting will enable people to vote securely from anywhere by using their mobile.the disadvantage of this paper is to support only android platform and authentication s big issue. Divya G Nair, Binu. V.P, G. Santhosh Kumar [8] n 2015 proposed secret sharing scheme by making shares of input and manipulating the shares to compute a typical function of input. it provide fast and accurate computation of result with voter privacy and the disadvantage of this fairly complicated protocol and difficult to provide security 3. EXISTING METHODOLOGY In existing system voters cast their votes by simply depositing their ballots in sealed boxes distributed across the electoral circuits around a given country, when the election period ends all these boxes are opened and votes are counted manually in presence of certified officials.in this process there can be error in counting of votes and some cases voters find ways to vote more than once.sometimes votes are even manipulated to distort the result of an election in favour of certain candidates.to avoid these shortcomings government of India came up with DRE(Direct recording electronic).this completely eliminate paper ballots from the voting process.however it has been found that EVMS are not tamper proof and are easily hacked. In this project, we integrate CIDR with e-voting mechanism to make e-voting in India reality. 4. PROBLEMS IN THE EXISTING SYSTEM Integrity of the election method can verify the integrity of democracy itself. Therefore the election system should be secure and strong against a range of fallacious behaviors, ought to be clear Associate in Nursing and comprehensible that voters and candidates can settle for the results of an election. However in history, there area unit samples of elections being manipulated so as to influence their outcome. In an exceedingly electoral system, whether or not electronic or exploitation ancient paper ballots, the system ought to meet the subsequent criteria Anonymity, Tamper-resistant, Human factor. 5. PROPOSED WORK We propose shopper server web-enabled computer code design for the project. On the shopper facet we've a fingerprint scanner and a interface that accepts voter s aadhar range, offer the system generated distinctive range for every citizen and show confirmation standing and error messages. The interface can solely act on events from the server and feedback of citizen with none additional process. Servers are placed at remote locations from the poll booths. They are used for finishing up all the process work like image process, transferring knowledge between the shopper and therefore the information. There is a central information known as Central Identities knowledge Repository that forms the backbone of the system. It contains all the demographic and biometric knowledge of each subject of Asian country. So as to cut back load on central information there are zonal information are settled aboard the server technology. The target of this project is to gift a high level summary of fingerprint sensing and matching technology therefore on give the reader with some insights into the strengths and limitations of the automation in matching fingerprints. 4252 www.ijariie.com 2139

Admin Aadhar and system generated unique number Enrollment Update Database Delete Voter Result Voting Fig -1 Architecture diagram of proposed method 5.1. AUTHENDICATION AND VERIFICATION OF THE VOTER: Authentication is that the method of determinative whether or not somebody or one thing is, in fact United Nations agency or what it's declared to be. In order to manifest someone we tend to need them to be.in user registration module, they are planning to enter their personal details at the side of aadhar number, our project we tend to done verification whereas user enter age, after coming into all details in user registration module, user click submit button. Then it move to another module referred to as verification of citizen therein user once more offer their aadhar variety at the side of Arcanum with they already given in user registration module. After that user enter in to enrollment module therein system can generate distinctive 4-digits variety for every user by suggests that o3 authentication. In that module user offer their fingerprint four times and click on verify. Then it mechanically verified their knowledge and move to the vote module therein user offer fingerprint only once and vote the candidate (party) and make sure their vote and eventually click submit. 5.2. MODULES: 5.2.1. CANDIDATE DETAILS: The Candidate Details are recorded within the information that shows the actual candidate UN agency electoral for involved party like DMK, ADMK, MDMK, etc. All the quantity of candidate UN agency electoral for the priority parties are recorded 4252 www.ijariie.com 2140

5.2.2. VOTER DETAILS: The citizen details are inserted into the information that performs finger print authentication for a selected citizen and citizen id is ought to be noted for corresponding citizen. The choice of explicit citizen is finished by victimization citizen id. The most method ought to acknowledge the finger print picture element illustration victimization Finger print algorithmic rule victimization Bio-metric Authentication 4252 www.ijariie.com 2141

5.2.3. FINGERPRINT ENROLLMENT In the Enrollment Process, the fingerprint is captured with the help of the fingerprint scanner, and the captured image is enhanced with the techniques used in paper, once the image is enhanced the feature called minutiae (ending, bifurcation) are extracted with the help of the minutiae feature extraction technique and the extracted features are stored in the database for verification. 5.2.4 BIOMETRIC VERIFICATION In the Verification process, the person who comes to cast a vote is registered his/her thumb impression in the controlling phase, once the image is captured it is enhanced and the feature is stored for future comparison. To check whether the voter is an authenticated voter, the input image is compared to the database. It is called authentication process. In case the print is not stored in the database, alert message will be given, so the person cannot vote or if the same person votes again, the system will display a dialogue box as Revoting, so that the security can be alerted. If the image is found in the database then the person is allowed to vote in the balloting phase. In the balloting phase there is the number of fingerprint scanner with the symbols equallent to the number of nominees. The person allowed in the controlling phase may depict his/ her thumb impression in the corresponding scanner for whom they like to vote. Once it is captured, the identification process is carried between the controlling and balloting phase in order to identify that the person who crossed the verification process is the person who cast the vote. If there is no deadlock condition occur (i.e) Both the captured and query image is matched then their vote is recorded for a corresponding nominee. 4252 www.ijariie.com 2142

4252 www.ijariie.com 2143

6. CONCLUSION In this paper, we've got planned an internet electoral system that is healthier and quicker than previous systems. The new system prevents access to ill-gotten voters, provides simple use, transparency and maintains integrity of the option method. The system conjointly prevents multiple votes by a similar person and checks eligibility of the citizen. It conjointly permits someone to vote from anyplace given that the citizen is inside electoral limits. 7. LIMITATIONS E-voting systems have several blessings over typical systems however it still has got to solve several hurdles before turning into coming back to fruition. India s majority population is rural and illiterate. Conjointly there's shortage of power and inadequate network between cities and villages that any adds to the issues. This technique needs smart information measure and high speed web affiliation for in operation, however it's still a far off reality in several cities in Asian country. But conditions area unit up with the onset of education in rural areas and with increasing urban population this project could presently become a reality. 8. REFERENCES [1].Yinyeh, M. O., & Gbolagade, K. A. (2013). Overview of Biometric Electronic Voting System in Ghana. International Journal of Advanced Research in Computer Science and Software Engineering. [2]. Prasad, H. K., Halderman, A. J., & Gonggrijp, R. (Oct. 2010). Security Analysis of India s Electronic Voting Machines. Proc. 17th ACM Conference on Computer and Communications Security (CCS 10). [3]. Frances Zelazny proposed the UIDAI, Biometrics Design Standards for UID Applications, 2009 [4]. Khasawneh, M., Malkawi, M., & Al-Jarrah, O. (2008). A Biometric-Secure e-voting System for Election Process. Proceeding of the 5th International Symposium on Mechatronics and its Applications (ISMA08). Amman, Jordan 4252 www.ijariie.com 2144

[5]. Himanshu Agarwal, G.N.Pandey, Online Voting System for India Based on AADHAAR ID, Eleventh International Conference on ICT and Knowledge Engineering 2013 [6]. K. P. Kaliyamurthie, R. Udayakumar, D. Parameswari and S. N. Mugunthan, highly secured online voting system over network, 4833 Indian Journal Science and Technology Print ISSN: 0974-6846 Online ISSN: 0974-5645 Vol 6 (6S) May 2013 [7].. Pranay R. Pashine, Dhiraj P. Ninave, Mahendra R. Kelapure, Sushil L. Raut, Rahul S. Rangari, Kamal O. Hajari, A Remotely Secure E-Voting and Social Governance System Using Android Platform, International Journal of Engineering Trends and Technology (IJETT) Volume 9 Number 13 - Mar 2 [8]. Divya G Nair, Binu. V.P, G. Santhosh Kumar, An Improved E-voting scheme using Secret Sharing based Secure Multi-party Computation, arxiv: 1502.07469v1 [cs.cr] 26 Feb 2015 4252 www.ijariie.com 2145